goodlisten

Clip

Security flaws in Coinbase
listen on Spotify
49:10 - 51:48 (02:37)

Security flaw in Coinbase allowed anyone to check the balance of any valid password and username for a month. Sim swap hackers are known to use this flaw to identify how much is in an account before stealing the phone number.

Similar Clips
The process of moving phone numbers from a customer's phone to a thief's phone in Telegram involves an insider who has access to the necessary equipment or login details, and cannot be hacked.
57:46 - 1:00:51 (03:04)
listen on Spotify
Mobile Phone Security
Summary

The process of moving phone numbers from a customer's phone to a thief's phone in Telegram involves an insider who has access to the necessary equipment or login details, and cannot be hacked. The cost of swapping phone numbers on T-Mobile is currently around $5,000 and up to $7,500 for fraud victims.

Chapter
How Phone Number Port-Out Scams Work
Episode
112: Dirty Coms
Podcast
Darknet Diaries
Online banking has revolutionized the way we access our bank accounts by providing convenience and ease of use.
00:00 - 02:29 (02:29)
listen on Spotify
Online Banking
Summary

Online banking has revolutionized the way we access our bank accounts by providing convenience and ease of use. Wells Fargo paved the way in 1995 as the first bank to offer internet banking to their customers.

Chapter
The Evolution of Online Banking
Episode
111: ZeuS
Podcast
Darknet Diaries
In a conversation about the possibility of a bank run happening, the concern is raised that warning people about it could actually create it.
1:14:46 - 1:19:09 (04:22)
listen on SpotifyListen on Youtube
Banking
Summary

In a conversation about the possibility of a bank run happening, the concern is raised that warning people about it could actually create it. The recommendation is made that a federal agency step in with a significant financial guarantee to backstop the banks and prevent a contagion effect from spreading.

Chapter
Warning of a Run on the Bank
Episode
E119: Silicon Valley Bank implodes: startup extinction event, contagion risk, culpability, and more
Podcast
All-In with Chamath, Jason, Sacks & Friedberg
Exploits and rooted devices can cost up to seven figures, but according to cybersecurity expert Matt Holland, it only takes about two hours and a budget to hack into a device.
07:54 - 11:10 (03:15)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

Exploits and rooted devices can cost up to seven figures, but according to cybersecurity expert Matt Holland, it only takes about two hours and a budget to hack into a device.

Chapter
Vulnerabilities in iPhones and the High Cost of Exploits
Episode
Hire 1 to Hire 10, Sam Gets Hacked, Shaan Buys a $200K NFT, and More with Andrew Wilkinson
Podcast
My First Million
Cam's partner had the stolen credit cards while he had the skills to withdraw money from them.
21:11 - 23:04 (01:53)
listen on Spotify
Stolen Credit Cards
Summary

Cam's partner had the stolen credit cards while he had the skills to withdraw money from them. The plan was to cash out and send half the money to the perpetrators in Kosovo.

Chapter
Becoming a "Casher" of Stolen Credit Cards
Episode
85: Cam the Carder
Podcast
Darknet Diaries